Thursday, November 28, 2019

Alcoholism Example

Alcoholism Example Alcoholism – Term Paper Example Your full full May 02, Alcoholism Alcoholism or Alcohol Dependence Syndrome is a type of chronic disease which is associated with excessive use of alcohol. â€Å"Alcoholism, also called alcohol dependence or alcohol addiction, is a destructive pattern of alcohol use that includes tolerance to or withdrawal from the substance† (Dryden-Edwards). Some of the main elements of alcoholism include craving, physical dependence, tolerance, and loss of control. According to Butcher, Mineka, and Hooley, a person suffering from this disease loses self-control at times, as well as creates various psychological problems for himself/herself. Some key symptoms of alcoholism include shakiness, sweating, neglecting home and job responsibilities, and uncontrollable need for alcohol. Researchers have proved alcoholism to be the major cause of violence and increase in the number of car accidents all over the world. A number of factors make people consume alcohol. Some of those factors include into xication, social influence, mental relaxation, nice taste, and decrease in depression and boredom. The level of intoxication associated with alcohol and the relaxation that people get through alcohol are two of the major factors that make people alcohol addict.Although stopping alcohol addicts from taking alcohol is difficult, but there exist some treatment methods that can be used to make people come back to normal life by leaving alcohol. Some of those methods include relapse prevention, individualized drug counseling, cognitive-therapy techniques, motivational enhancement therapy, and use of stimulus control and urge control techniques. The outcome of these treatment methods is positive most of the times as alcohol addicts start changing their life patterns by stopping or reducing the use of alcohol and alcoholic products.Butcher, James, Susan Mineka, and Jill Hooley. Abnormal Psychology. 14th ed. Boston: Allyn & Bacon, 2009.Dryden-Edwards, Roxanne. â€Å"Alcohol Abuse and Alcoh olism.† Medicinenet.com, n.d. Web. 02 May 2012.

Sunday, November 24, 2019

Persuasive Essays on Abortion

Persuasive Essays on Abortion Persuasive Essays on Abortion Persuasive essays on abortion should point out that whether or not abortion should be allowed has long been a controversial topic for heated debate and discussion: Persuasive essays on abortion should start by taking a stand that is either for or against abortion by offering a thesis statement in the first paragraph that reads something like, It is the contention of this essay that abortion should be easily available for women who have an unwanted pregnancy due to the following reasons If you need an essayof the highest quality place an order on our website and get 15% off on your first order. Points for abortion Even though it has been argued that aborting a child once it is conceived boils down to the taking of a helpless life-others feel that a child in the womb has not yet developed in to a human being-(some argue that the soul only enters an infant shortly before birth)-and so it is not wrong to do away with an unwanted pregnancy at an earlier stage. Those that vehemently decry abortion do so on religious grounds by stating that it is a sin to take a helpless life. Two of the main religions that oppose abortion are: The Catholics Muslims The entire argument has divided the public into those that vehemently oppose abortion and these have become known as pro-life activists; while those that are for the free choice of women are known as pro-choice activists. Both have strong views for and against abortion. Persuasive essays on abortion should point out that while many oppose abortion on religious and ethical grounds- women who are actually carrying the child feel that they need to get ownership of their own bodies-(instead of having people telling them what to do) Pro-choice activists also firmly believe that life only begins at birth and so there is nothing wrong with terminating an unwanted pregnancy. Persuasive essays on abortion should draw attention to the fact that pro-choice activists arguing for abortion may be doing so for a number of very good reasons like:- Reluctant mothers may be trying to terminate an unhappy marriage They lack the means to support a child They are too young and a teenage pregnancy can result in the life of both the mother as well as the child-getting ruined. Pro-choice activists argue that a mother that does not want her child and is forced to have the baby is also most likely to ill-treat the child or deny the nurturing love and care that he/she would require growing into a mature and well balanced human being. Visit our safe paper writing service to get A+ essay right now! Read also: The Stolen Party Term Paper Sample Papers Report Writing Help Process Analysis Case Study Police Performance Term Paper

Thursday, November 21, 2019

EKON Essay Example | Topics and Well Written Essays - 1500 words

EKON - Essay Example Looking at the demand or need of any certain product can bring innovation. EKON has been lucky enough to find a need for chairs that cater the customers with back problems and also those customers who require sympathetic chairs. With need we even have to see the target market of our new products, apply marketing mixes and assess whether the product would be successful or not. This report would brief us on things to consider before launching the new products. Ekon will first have to research on the products that they plan to launch by the help of marketing research process. Through this process we will systematically design, collect, analyze and report on data and findings relevant to our launching of the two new products. We can even outsource this process or form our own marketing research team. The marketing research process takes place in six steps: (see reference list for the source). 1. Define the problem and research objectives: marketing management will inform the research team about the two products being launched, but the management will have to be careful not to define the problem too broadly or narrowly. With the problem defining, decision alternatives and research objectives will have to be made clear. The team would be covering the customers falling under the backache problems or in need of sympathetic chairs. Now what kinds of things do the customers want in the prescribed form of chairs would be found after the process ends. 2. Develop the research plan: after we make clear objectives of our research the team will have to come up with the most efficient plan to gather the information needed. Like data sources (primary and secondary data), research instruments (questionnaires, surveys, behavioral data and experimental research). The EKON team will have to see the feasibility and available budget before forming the plan. The retrieval of data from any source may vary in terms of cost. EKON plans to

Wednesday, November 20, 2019

The film Boys Dont Cry Movie Review Example | Topics and Well Written Essays - 1250 words

The film Boys Dont Cry - Movie Review Example Since its inception, films are determined to encompass a plethora of complete human activities and are saturated with them. Human mind and its excellence at aesthetic paradigm evolve out with multiple hues at length while coming into the interface of any art medium. Films like any other art medium involve human mind in its creation, it displays human action and most importantly they are made to be comprehended and enjoyed by human minds as its audiences. Films are always considered as a wide form of art medium through which the manifestation of the striking moving images decorated with vibrant colors and sounds enables a connection between the film-makers and audience upon the matrix of celluloid and the senses enhanced through the pictorial description of emotions and actions. The intensity of the influence which a film leaves on the minds of its audiences cannot be undermined at any level. Therefore, the sociological aspect of the film, or myriad social psychologies depicted through the medium of the films holds a very important space in the minds of the modern audiences. With the growing complexities of life, the films began to develop with foreboding complexities. Skip Dine Young in his book, â€Å"Psychology at the Movies† mentioned rightly, â€Å"The psychology of film can be unified by thinking of movies as symbols. Movies are symbols that have meaning; these symbols are created by ways do they infuse aspects of themselves into their creations? While it is probable that everyone who works on a movie brings something of him or herself to the activity, I focus on those artists whose individuality is in the foreground- the directors (who make the final choices about how a movie looks and sounds) and the actors (whose visual likeness is so vividl y captured on the screen)† (Young, 2012). A latent symbolic framework does operate within the films upon which the complex social psychology depicted through various modern films gets manifested. â€Å"Boys Don’t Cry† as an independent American drama amazed the audiences in the year 1999 by depicting the story of Brandon Teena, a transsexual man and his predicament evoked the themes of desperation, insensitive attitude and the issues of empowerment and gender equality prevalent in the society of contemporary times. At the same time, the subtle display of psychology operating in terms of dealing with these issues in society forms the crux of the film. Social Psychology and Boys Don’t Cry In October 1999, the American drama, â€Å"Boys Don’t Cry† was first premiered which was based on a real life story. Being the reflection of a true incident, the film mirrored many intricacies and complexities of modern society at length. Directed by Kimberly Peirce and co-written by Andy Bienen, the film stars Hilary Swank in the role of Brandon Teena whose powerful acting paved the way for her receiving Best Actress in the Academy Awards. Brandon Teena was a transsexual man who was allegedly beaten up brutally, raped and tortured by his male partners after they discovered that Teena had a female by body. Depiction of this incident through the medium of film was not a piece of cake. The film did not hint at only displaying the content as a crime thriller. On the contrary, a very strong social message was inherent within the film which evidently develops its social psychology. A strong notion and social perception towards body of a woman specially develops the pivot of the film’s aspect towards prevailing psychology of the society. When America was vouching on the propositions of same-sex marriages and gender equality, the film, â€Å"Boys Don’t Cry† reinstated the hollow pursuits involved with the concepts of gender equality and rights of transsexuals in the American society. If America with its teeming American dreams could not secure the rights of its citizen within a social structure which is so liberal and cosmopolitan in nature, it is quite evident that the future of the minor sexual entities such as transsexual men or women is in

Sunday, November 17, 2019

Assignment 4A Coursework Example | Topics and Well Written Essays - 250 words

Assignment 4A - Coursework Example It leads to the creation of a wide pool of entrepreneurs who are able to take on the challenges facing the modern society and generate revenue through entrepreneurial ventures (Bers, Head, & Palmer, 2014). This can be achieved by setting up experimental learning where students are exposed to practical learning process. Establishing such colleges ensures the development of sustainable culture of entrepreneurship in the society. The two readings, though having different approaches, are related to each other. Both readings focus on funding learning institutions, colleges and universities. Both reading acknowledge the importance of proficient financial management within learning institutions. Despite the fact that Margaret J. Barr and George S. McClellan focus on both colleges and universities, while Trudy H. Bers, Ronald B. Head, James C. Palmer focus exclusively on community colleges, the ideas that the authors covey are basically the same. For example, both readings explore the concept of budgeting and attempt to create a clear understanding of the budgeting concept, which is crucial for survival of learning institutions. I agree with my colleague that the readings are very crucial for college administrators because they provide useful information about effective management and allocation of scare resources to achieve optimum

Friday, November 15, 2019

Criminology Essays Terrorism Airports Security

Criminology Essays Terrorism Airports Security Terrorism Airports Security Defeating Terrorism Assignment Abstract Small municipal airports that serve communities near major metropolitan areas may not have appropriate security measures in place. These municipal airports have not received the same scrutiny or funding as major airports. Regardless, small airports face challenges and risks similar to larger facilities. Additionally, vandalism, petty theft, and commandeering of an actual aircraft are incidents for which administrators at smaller airports need to strategically plan. Every airport (small or large) does face some similar threats, but as all facilities are not the same smaller airports require unique security measures. There are several factors to consider when planning that include, but not limited to, geography, demographics, budget, and facility design. All are integral components which must be examined in light of proposed prevention, preparedness, response, and recovery measures. This paper will discuss multiple areas that an airport security administrator in charge of a municipal airport must examine in regard to contemporary threats. It will also discuss current and proposed security measures and safeguards for smaller airports as well as the hierarchy for administrative responses. Introduction The events of 9/11 placed terrorism at the forefront of the minds of many Americans. One cannot dismiss the possibility of another terrorist attack on United States soil. The use of aircraft for carrying out acts of mass destruction, killing civilians and severely disrupting an economy has proven a fruitful tactic for the enemies of democracy. Although, September 11, 2001 served as a catalyst for the pioneering of new methodologies for anti-terrorism and securing airports, there are still great strides that need to be made. A functional, yet universal and adaptable concept regarding security procedures for large and small airports must be established, maintained and frequently reevaluated. Much of the current success for elevated, refined security measures and advancements in technology for larger airports can be attributed to the United States Federal Government and the development of the Department of Homeland Security. Their mission to prevent, minimize, respond and recover from catastrophic incidents has materialized in the airline industry through the Transportation Safety Administration. However, security at small community municipal airports have not received the same amount of attention or federal funding. Larger, commercial airports have received the vast majority of attention; this is mainly due to passenger volume and smaller airports being privately owned and in many cases self-reliant for revenue and maintenance. As of yet, smaller municipal airports have not been successfully compromised and the potential for sensational nationwide devastation is somewhat limited. Because the United States continues to makes strides in improving security conditions at major airports, we must recognize that terrorists may already be assessing softer targets like commuter airports. Threats One of the most common threats that municipal airports face are small crimes which have the potential to escalate quickly. The number one threat facing a community airport is the theft. Theft can range from equipment to fuel. Sources of threats can be internal, domestic or foreign. Since September 11, 2001 security administrators have re-prioritized their threat assessment to include theft of a small aircraft. Currently theft and/or hijacking of a small aircraft are one of the major concerns to owners, operators and pilots. Threats of this type generate significant risk to personnel and serious financial losses. Depending on the motive of the intended thief or hijacker, theft of a small aircraft also presents a danger to the general population and surrounding communities. With manifold consequences in mind, airport security is strongly motivated to protect life, property and prosperity. It is in the best interest of owner/operators to devise measures that will prevent misuse of their aircraft (International Council of Aircraft Owners, 2005). Criminal mischief, sabotage, and vandalism are also threats that community airports must counter. In dealing with these threats, one must consider mechanical and functional destruction and not just the cosmetic damage to a faà §ade or loss of replaceable equipment. Accessibility restrictions to aircraft storage and maintenance areas can be difficult to impose and enforce in multiple circumstances. Existing controls imposed at airports must do their utmost to deter theft and criminal mischief as well as sabotage to operating equipment (International Council of Aircraft Owners, 2005). Risks After the tragedies of September 11, 2001, the American public questioned not only the events of that day, but also the circumstances leading up to the successful terrorist operation. Questions such as: Who was behind the attack? What was the goal or purpose? When did planning begin? Where did they receive flight training? Why did this happen? How where they able to carry out these attacks? These types of questions appeared on every television station, newspaper and radio broadcast in the United States for months after attacks. Airport Administrators are now realizing the potential appeal for misuse of smaller airports and their vulnerability to criminals and terrorists. It has become apparent that procedures for background checks of employees, instructors, students, pilots and passengers is an evident way to reduce risk and ensure the integrity of an airport and its operators. With the pressing concern of advanced terrorist attacks employing weapons of mass destruction, the attraction of small aircraft as a target cannot be ruled out. The ability of small aircraft to spread chemical weapons could potentially be as severe as an attack on a nuclear power plant. Terrorists may not be able to buy or steal a nuclear weapon at a small airport, but opportunities exist for terrorists to use aircraft as a tool to assist in their sinister plots. For example, a terrorist may contemplate some type of nuclear terror stratagem. It could involve attacking a nuclear power plant using a small plane to breach perimeter security and then be used as a guided missile to reap destruction and chaos. It is important to keep in mind that an attack on a nuclear power plant may transpire whenever someone with a terrorist mindset hijacks a commercial airplane or charters a private one. A private plane could be easily filled with conventional explosives (Nykolyshyn, 2006). Recent studies conducted over the past several months by the Electric Power Research Institute (EPRI), have shown that structures housing reactor fuel in United States nuclear power plants will be protected against the release of radiation even if struck by a large commercial jetliner. State-of-the-art computer modeling techniques have determined that typical nuclear plant containment structures, used fuel storage pools, fuel storage containers, and used fuel transportation containers at United States nuclear power plants would withstand these impact forces despite some concrete crushing and bent steel (Nuclear Energy Institute, 2002). Nonetheless, if terrorists were able to acquire an aircraft and attempt to crash into a nuclear power plant, it raises further suspicions and fears of their capabilities and tenacity./a> An IAEA spokesman once claimed that current nuclear power plants were never designed to withstand an attack by â€Å"a large jumbo jet full of fuel†, and prior to 2001, the likelihood of such a crash was never considered high enough to be included in safety regulations (Bunn, 2001). Further vulnerabilities that small airports present for criminals and terrorists are the lack of federally mandated security and technology measures. Often people are able to slip through the cracks or â€Å"go under the radar† without drawing attention to themselves. Criminal organizations have been known to use small community airports to transport and smuggle illegal immigrants, drugs and other illegal contraband. These risks are major concerns for Airport Administrators. This is especially true near the southern Border/Coastal States. According to the Tennessee Airport Information Center (2005), a Cessna aircraft carrying six undocumented immigrants, including the pilot, took off from Fullerton Municipal Airport in California but was forced to land at Cannon Air Force Base in New Mexico, after running out of fuel. The plane crossed the country picking up undocumented Brazilian citizens in Boston on the way to Atlanta. It was the second time the pilot −− an illegal immigrant whose legally registered plane appears on Federal Aviation Administration records −− had flown undocumented immigrants. The flight identifies potential security vulnerabilities of small private and municipal airports, which often conduct little or no screening of small planes (Tennessee Regional Information Center, 2005). One of the principal changes is requiring a background check for a private pilot’s license. According to the Aircraft Owners and Pilots Association (2008), a candidate is now required to submit the following information for a background investigation: Full name, gender, current address and five-year address history, date and country of birth, and citizenship information. Security and Safeguards Security at small community airports can be very costly. In order to cut costs, community airports typically use outside contractors for their security. One such company is Navigance, which boasts a comprehensive physical security solution by integrating technology to security systems while mitigating risks. Their technological innovations create security systems that can deliver a revenue stream for airports by providing secure wireless broadband communications and remote monitoring serving both tenant and transient customers (Navigance, 2007). Many small airports have no security at night. Control towers, if they exist, often close for business at 6 or 9 p.m. Security fences are uncommon, although some airports are beginning to recognize the new threat environment and are constructing fences accordingly. Lack of security seems to fit the freewheeling world of private aviation, which nearly collapsed when the federal government banned many private flights for weeks after Sept. 11 (Dotinga, 2002). As augmentation to fencing, community airports must consider using cameras as another layer of protection for perimeters and surrounding areas. To remain current, security upgrades must include wireless digital cameras with a three-week archiving system (minimum) and a state-of-the-art wireless access control system for vehicle gates. The cost is not overly prohibitive. Integrators often re-sell the products as part of larger, turn-key package. Therefore these system prices do vary. Ballpark figures can be in the range of $2,000 to equip a single gate or door with an access panel and reader. And depending on an airports configuration, one panel can control up to four gates/doors. A monthly, per-panel network access fee, usually costs less than $100 and keeps each one tied into a central monitoring station and data storage repository (Broderick, 2003). Security Consideration When developing a plan for perimeter security, there also needs to be a great deal of consideration for access roads leading up to alternate parking. Alternative parking will offer entry/exit points for access onto the main airstrip. The alternate entry/exit points should be located on both sides of the airport. They too need to be secured by some type of fencing and gate and should not be used for daily activities. The purpose behind the alternate parking lot entry/exit points should be reserved for emergency vehicles and contingency use only. Currently, very few small airports have the resources to secure and protect its parking areas 24 hours a day. One security feature that small airports should implement is the ability to identify both employees and visitors upon arrival and departure of a facility. According to Thomas W. Wathen; â€Å"Protecting life and property frequently requires that you identify employees and visitors entering and leaving the premises you guard† (1989, p. 141). First one would start by confirming that employees and visitors are cleared for access onto the property by verifying their identification. Security personnel should record and track the employees or visitors time spent on the grounds as well as their intentions. Random and routine searches can offer security and work as a deterrent for theft and criminal mischief. Secondly, to help protect people and the facility, an airport should ensure extensive lighting exists not only on the exterior and interior of the building, but on parking areas, gates entry/exit points, on all access roads leading to the facility, and at security enclosures. Security lighting is an inexpensive and effective preventative measure against intrusions or other criminal activities. This type of lighting aids security personnel in the detection of intruders and works as a deterrent. It also promotes a feeling of safety among staff and visitors. Lighting should not be limited to night; lightning should be able to turn night into day (Broderick, 2003). Thirdly, all parking areas should be equipped with overlapping video surveillance that is continually monitored and recorded. A municipal airport should be able to install a relatively small number of cameras to achieve complete coverage of parking and other public areas. Last but not least, a small airport should consider the feasibility of employing security officers to patrol the parking area as well as inside and outside the perimeter of the facility. The physical presence of a guard, even if conducting patrols at random intervals provides yet another layer of protection. Optional Security There is optional security equipment that can be utilized to augment security and barriers already addressed. Physical security can contain features such as motion detectors/sensors and laser light beams. Although this may enhance the detection of an intruder and alert security for a faster response time, there are drawbacks to the use of these types of security sensors. One major drawback to these additional security measures is cost effectiveness. Prior to implementation, considering a total cost approach when budgeting for an overall safety and security plan is paramount to success. The second drawback is the reliability of such devices and their room for marginal error. For example; movement of wildlife and debris blowing in the wind could cause numerous false alarms. This in turn, can tie up human resources that could be better utilized in other areas rather than responding to false alarms. All doors and storage facilities should be equipped with some type of pass card readers. These pass cards take the place of keys, and serve to identify and track personnel and visitors. This is the surest way to maintain an accurate head count for the number of personnel in a facility at any given time. Pass cards also work as a deterrent by restricting access into protected areas. Within a guarded facility, this is important based on job function, personnel needs and responsibilities. Information garnered from pass cards can be recorded and maintained for a determined period of time for auditing purposes. If an employee forgets or loses the pass card, then they must inform security at the gate and be issued a temporary pass card for the day until filling out the proper forms for a new one with human resources. Additional advantages to pass card readers are; upon the termination of an employee, their old card can immediately be deactivated. If one finds their lost card it can be reactivated at that time. In the long term, this will reduce the expense of re-keying locks in the facilities and obtaining company property back from an employee upon termination. It also prevents the risk of employees making duplicate keys. All visitors and vendors will also be required to check in at the security gate and be issued a temporary pass card with limited controlled access. Those who own storage garages for their personal airplanes will be issued a pass card to their own storage facility upon the granting on their signed contract and background check with the facility. The pass card identification system presents multiple security solutions for preventing and eliminating vulnerabilities. They work to immediately increase security and reduce future expenditures. Although more expensive, adding photographs to access cards provides an even greater level of security. Airport Hierarchy As previously discussed, municipal airports typically contract out their security operations. If economically feasible, security organizations should screen and hire their own security forces. If resources are available, security officers should be stationed strategically at vulnerable points revealed by a thorough risk assessment. For example; One security officer should remain in the dispatch and surveillance office at all times. A security officer should be stationed at the entrance/exit gate at all times for vehicle and personnel checks. In addition, an officer should be on constant interior patrol of the facility and an officer should be on constant exterior patrol of the facility. It will initially be the responsibility of the security officer to notify the proper chain of command during nature or manmade disasters. They will assess and direct response teams to the disaster and crisis sites. In turn, airport hierarchy for response should work similar to the below list: Responding officer on-site Airport facility management Local law enforcement and first responders Surrounding jurisdictions with mutual aid agreements Although municipal and private airports are regulated by policies, goals, and objectives, to an extent, they should have common standards of operation. These Standard Operating Procedures (S.O.P.) should include maintaining the safety of its travelers, support economic prosperity, preserving investment and a level of service to state, national and international markets (Bend Metropolitan Transportation Plan, electronic). Familiarization with, and regularly scheduled training in the National Incident Management System (NIMS) and Incident Command System (ICS) is a must as large scale incidents can quickly overwhelm the response capabilities of airports serving smaller communities. Participation in joint exercises with local law enforcement and first responders will provide the foundational principles to be employed during a catastrophic event and give the owners/operators of small airports an opportunity to examine current preparatory measures and refine protocols for incidents of varying consequence. To conclude, municipal airports face a myriad of challenges similar to the challenges seen in large commercial facilities. Because America has yet to see a catastrophic act of terrorism involving smaller aircraft, attention paid to security at municipal airports has been minimal. Although the risks to National Security are not as obvious or as potentially catastrophic, particularly in the absence of a successful execution of a chemical or biological attack, smaller airports with limited security budgets are an attractive and softer target for terrorists who may be thwarted by improved security at large terminals. There are many cost effective solutions available to reduce the vulnerability of municipal airports; training in NIMS and ICS principles as well as developing an understanding of how to best utilize outside resources is of negligible cost but could well prove invaluable in the face of an actual catastrophe. Unfortunately, in a time of limited resources and unlimited potential threats, it may take a successful terrorist attack to increase emphasis on the security vulnerabilities of municipal airports. References Aircraft Owners and Pilots Association. (2008, January 29). Government advocacy. Retrieved April 14, 2008, from http://www.aopa.org/tsa_rule/. Bend Metropolitan Transportation Plan. (n.d.). Aviation Systems. Retrieved April 14, 2008, Retrieved from http://www.ci.bend.or.us/depts/community_development/bend_metropolitan/docs/Chapter_15_Aviation_Systems_Final.pdf Broderick, S. (2003, February 1). No High-Wire Act. Retrieved April 14, 2008, from http://www.ultra-safe.com/RedlandsAirport.htm. Bunn, M. (2001, October 29). Reducing the threat of nuclear theft and sabotage. Retrieved April 14, 2008, from http://belfercenter.ksg.harvard.edu/publication/12691/reducing_the_threat_of_nuclear_theft_and_sabotage.html. Dotinga, R. (2002, January 8). Small airports, big problem? Retrieved April 14, 2008, from http://dir.salon.com/story/news/feature/2002/01/08/airport_security/index.html. International Council of Aircraft Owners. (2005, January 18). IAOPA Input for ICAO Security Manual (DOC 8973). Retrieved April 14, 2008, from http://www.iaopa.org/info/security_manual.html. Navigance. (2007). Brochure. Retrieved April 14, 2008, from http://www.navigance.com/brochure/navigance.pdf. Nuclear Energy Institute. (2002, January 23). Analysis of nuclear power plants shows aircraft crash would not breach structures housing reactor fuel. Retrieved April 14, 2008, from http://www.nei.org/newsandevents/aircraftcrashbreach/. Nykolyshyn, O. (2006, February 6). Summary of the book Nuclear terrorism: The ultimate preventable catastrophe., Vienna. Tennessee Regional Information Center. (2005, May 27). Illegal immigrants on flight. Retrieved April 14, 2008, from http://www.tbi.state.tn.us/TRIC/tbi_triccn_files/05.27.05.pdf. Wathen, T. W. (1989). Security Subjects, a Primer for Protection Officers. Van Nuys: Guardian Security Publications.

Wednesday, November 13, 2019

Overpopulation in India Essay -- Environment Environmental Essays

Overpopulation in India: The Need for Improved Quality and Diversity of Contraceptive Options On May 11, 2000, Astha (Faith) was born in the Indian capital on New Delhi.[1] Her birth was not only a significant occasion for her parents, but for the entire Nation of India. Astha’s birth was designated the official point at which the Indian population crossed the one billion human beings mark.[2] India was thus officially inaugurated into the very exclusive one billion inhabitants of one nations club, and the world was left to ponder the repercussions of such a development. Stepping over the one-billion line brought into question all the policies, efforts, and difficulties that the Indian government had implemented and fought for over a half a century in order to prevent just such a joyous occasion from happening. The Indian Family Planning Program, initiated in 1952, was a sign of the desire of Indian leadership to develop the nation and take the steps necessary to do so. The program has evolved throughout the years, meeting varied success; however, in the year 2000 one aspect of the program has become blatantly clear – it has not succeeded in slowing India’s rapid population growth to a population replacement level. One of the major reasons India has failed to reach the replacement rate is because of a family planning program that emphasized sterilization as the main method of contraception and de-emphasized temporary methods. The services provided by the program were of poor quality. If the Indian government can even hope to reach its ultimate total fertility rate (TFR) of 2.1 in all of its states and provinces, it must shift its policy from the emphasis on sterilization as the main method of birth con... ...could be a good alternative for women who forget to take daily birth control pills. The ring is inserted into the vagina where it releases estrogen and progestin. The benefit of the ring is that it can be inserted for three weeks at a time thus disposing of the daily pill-taking requirements of traditional oral contraceptives. The widespread availability of such a method could have a similar effect as that of centchroman. Another contraceptive method, the female condom, could help alleviate cultural resistance to birth control. The female condom would perhaps increase participation in family planning by those couples who do not wish to use methods that have more side effects, but whose male partner is reluctant to use condoms. [47] Government of India. Department of Family Planning. National Population Policy. 2000. http://mohfw.nic.in/ppolicy.html.pdf

Sunday, November 10, 2019

Toyota’s Production Process

Many companies have tried to understand and replicate the production process at the various Toyota facilities, but until you stop just looking at the surface and take a deeper look you won’t fully understand all the positive aspects to the production line. Toyota is known for their distinctive practices and precision work throughout the years and their amazing use of internal benchmarking to help the company continue to move forward. Because of the positives within the company’s dynamics Toyota has comfortably been on top of other companies in their industry.Toyota is not shy when it comes to show and giving ideas to other manufacturers to improve their own processes, but very few actually accomplish the success that Toyota has. Not because it is too trying to do, but because the manufacturers that come into to evaluate confuse the tools and practices they see on their plant visits with the system itself. The process at Toyota isn’t a process that you can simply look at and understand; you truly have to get a closer look and really dissect it.A study was done to understand the process completely including service functions like equipment, maintenance, workers’ training and supervision. All of these sections were taken into a count because the service functions help and are responsible for the whole process moving the way that it does. Toyota, like other manufacturers has many specifications set to create everything correctly, but only thing that Toyota does to get those specifications where they need to be is using a hypothesis method. It is a rigorous problem solving method, but it has shown to be very beneficial to the company.The article summaries the four rules that they believe to underlie the Toyota production system. Rule 1: How People Work; all work shall be highly specified as to content, sequence, timing and outcome. This rule is implemented well because it doesn’t just target senior workers or supervisors; it is set in place to be accomplished by all workers no matter the hierarchical role. Although this may seem obvious that a manufacturer would complete every task this way it actually is the case at most companies.Other companies are completing the tasks presented, but they aren’t following through and making as precise measurement and protocols as Toyota does. For each ‘station’ there are timings to when things should be done to complete in a timely manner while making sure things are done correctly. The detailed step through every process keeps Toyota moving smoothly and efficiently. Rule 2: How people Connect; every customer-supplier connection must be direct, and there must be an unambiguous yes-or-no way to send requests and receive responses.Toyota has created outstanding relationships between each person and the individual who is responsible for providing that person with each specific good or service. An outcome to this is that there is no discrepancy with the tim ing of shipment and who is making the shipments. This rule extends to the consumer as well. For instance if something is wrong with the product there is no problem figuring out who will assist with the problem that arose. The number of workers within a team is set out based on the number of problems that may occur during the process.Toyota exemplifies a direct and effective method through each step of the development process. It is designed that people are suppose to respond within a certain time frame and with this provision it doesn’t allow for errors to occur and if they do arise then it will be dealt with timely manner. Toyota stresses helping others through the process so it is everyone’s responsibility for things to be completed on time and with no errors. If help is needed, help must be received in the time it would to complete the task that is in need of some help.By doing this problems are hidden or pushed to the side, but rather called attention to and fixed as soon as possible. Rule 3: How the Production Line is Constructed; the pathway for every product and service must be simple and direct. The production line links each person who contributes to the production and delivery of the product, form the Toyota factory. This rule simply means that the process isn’t just moved from person to person, but more specific. The job is moved from specific person to specific person to make it more efficient and reliable.When this is applied to every ‘station’ of the development process there is less of a chance of error or variance among the workers. This doesn’t slow down the process by any means; instead it actually speeds up the process because the process doesn’t need to be stopped for fixing or maintenance. Within Toyota’s plants the pathway for assistance is three, four or even five links long, which connects the workers to the floor managers. In the past Toyota experimented with the method of just mov ing the process to the next available person, but this system showed to not benefit Toyota’s production line.When Toyota implemented the idea of moving it to a specified person rather than just the next person the process was more productive and less likely to cause error. Rule 4: How to Improve; any improvement must be made in accordance with the scientific method, under the guidance of a teacher, at the lowest possible level in the organization. Toyota really stress the fact that training is necessary to complete any task, not just by senior employees, but an actual training clinic. In the Toyota plant for example workers were adjusting and perfecting their problem solving skills by redesigning their own work.Managers were training the employees to frame the problem better and to formulate and test a hypothesis, which is an example of the scientific method. If the employees in the company think that the process could be more productive if they were to change something in th e process then it is expected, by the managers to explain the process change and the logic behind why it would work better than the process before. Frontline workers make the improvements to their own jobs, and their supervisors provide direction and assistance as teachers.This process remains the same even at higher levels and more complex jobs within the company. This means that the learning and the problem solving done takes place in all areas of the company not just one. When looking at Toyota’s production system you can see a direct correlation between their process and a lean development process. A lean development process is about doing more with less and doing it with speed and right the first time around. This is exactly what Toyota exemplifies.There are four distinct components to lean processing; customer relationships, production development, order fulfillment and supply chain. Those four components coincide with the four rules set out in the article. Toyota compl etely uses the less is more policy by using less time, inventory, space, people and money as stated in lean processing. Because the line runs smoothly at Toyota it takes less time to actually assemble products and this is directly related to the specifications set out at each ‘station’ and the team work that is involved with finishing the product.Toyota saves a lot of money as well because they aren’t going back and fixing the process repeatedly and the chances of errors are rare. At Toyota they also try to have a limited number of inventories because inventory costs a lot of money for a company. Instead of having inventory Toyota uses the just in time method. This method is used to make products to order right when the customer needs the product. Overall the process at Toyota is efficient and hard to immolate. Toyota is a prime example of a productive lean process that has shown to help a company and put the company on top in the industry.

Friday, November 8, 2019

State legislators essays

State legislators essays The state legislatures make many decisions that affect our daily lives. State law regulates our workplace, assesses taxes on our department store purchases, and imposes sanitary restrictions on where we eat. In state government, the key elected representatives are the state legislators. It is the state legislators job to reflect the will of the people and protect peoples rights guaranteed to them in the constitution. The states now are particularly active now in enacting legislation that addresses issues of education, crime control, and public welfare. State legislators have been challenged with the job of making school funding equal throughout the state. This is a very difficult task because some school systems are increasingly wealthy, while other systems are increasingly poor and under funded. Public education is not the only difficult task that is left to the state legislators. Crime control, welfare reform, and many other different issues are left up to the state legislatures. One of the most important tasks that take place in state legislature is the passing of laws. In order for a bill to become a law in most states, it must go through a lot of different steps. A bill may first be introduced in either one of the houses, Senate or House of Representatives. A Committee studies the Bill and often holds public hearings on it. A Committee report is read in open session of the House or Senate, and the Bill is then referred to the Rules Committee. The Rules Committee can either place the Bill on the Second Reading Calendar for debate before the entire body, or take no action. At the second reading, a Bill is subject to debate and amendment before being placed on the third reading calendar for final passage. After passing one House, the bill goes through the same procedure in the other House. If amendments are made, the other House must concur. When the Bill is accepted in both Houses, it is signed by the respect...

Wednesday, November 6, 2019

The Influence of Teachers Words and Actions

The Influence of Teachers' Words and Actions Teachers can have a huge influence on their students.  This goes much deeper than the lessons they teach. You only have to reflect on your own time in school to realize how positive or negative experiences can stick with you for the rest of your life. Educators need to remember that they hold great power over students in their hands. Words Can Uplift By encouraging a struggling student and explaining how she can be successful, a teacher  can change that student’s career. A perfect example of this happened to my niece. She had moved recently and began attending a new school in ninth grade. She struggled through most of her first semester, earning D’s and F’s. However, she had one teacher who saw that she was smart and just needed some extra help. Amazingly, this teacher spoke to her only once. He explained that the difference between earning an F or a C would require just a bit of extra effort on her part. He promised that if she spent just 15 minutes a day on homework, she would see a huge improvement. Most importantly, he told her that he knew she could do it. The effect was like flicking a switch. She became a straight-A student and to this day loves learning and reading. Words Can Harm By contrast, teachers can make subtle comments intended to be positive but are actually hurtful. For example, one of my best friends in school took  AP classes. She always earned B’s and never stood out in class. However, when she took her AP English test, she scored a 5, the highest possible mark. She also earned 4’s on two other AP exams. When she returned to school after the summer break, one of her teachers saw her in the hall and told her that she was shocked that my friend had earned such a high score. The teacher even told my friend that she had underestimated her. While at first my friend was delighted with the praise, she said that after some reflection, she was annoyed that her teacher didn’t see how hard she had worked or that she excelled in AP English. Years later, my friend now an adult says she still feels hurt when she thinks about the incident. This teacher likely only meant to praise my friend, but this faint praise led to hurt feelings decades after this brief hallway discussion. The Donkey Something as simple as role-playing can bruise a students ego, sometimes for life. For example, one of my students spoke of a former teacher she really liked and admired. Yet, she recalled a lesson he presented that really upset her. The class was discussing the barter system. The teacher gave each student a role: One student was a farmer and the other was the farmer’s wheat. The farmer then traded his wheat to another farmer in exchange for a donkey. My students role was to be the farmer’s donkey. She knew that the teacher simply picked kids at random and assigned them roles. Yet, she said that for years after the lesson, she always felt that the teacher had picked her as a donkey because she was overweight and ugly. Words Stick With Students The example illustrates that a teachers words can really stick with students for their entire lives. I know that I have tried to be more careful with what I tell students each day. I’m not perfect, but I hope that I am more thoughtful and less damaging to my students in the long run.

Sunday, November 3, 2019

Managing Diversity and Equality Essay Example | Topics and Well Written Essays - 500 words

Managing Diversity and Equality - Essay Example Legislation may only put the figure in the boardroom for example but without the same accountability and power, as well as pay, the figure means nothing. Legislation has mandated equal salaries for equal positions yet there are no true definitions as to what an equal position is. Women, for example receive very little middle management training so is their salary not worth less when they are moved up to the boardroom The answer here, again, may not be the legislation. In the last 30 years, the global market place has become the way of business. To survive in that marketplace corporations must be diverse and able to use every bit of knowledge and ability that is contained within their very diverse staffs. Only those that are able to do this will be able to survive. Women are not only a major part of the workforce throughout the world but are also a major part of the purchasing force. Therefore, to not put them in an ideal position is a mistake. They know what is going to be purchased and what is not. Their ideas of how to work with other women, how to motivate them, and how to move their corporations forward will be essential. Leverage is a word often used by corporations throughout the world.

Friday, November 1, 2019

The Rogerian Research Paper Example | Topics and Well Written Essays - 1250 words

The Rogerian - Research Paper Example After completing the essay, I have acquired a balanced perspective regarding the two positions. The only difficulty I found in the writing of the assignment is reconciling the two views and giving a balanced position without being biased. This was only possible after considering the weaknesses and strengths of the each side. This was difficult because initially, I had my bias. In this assignment, I have enjoyed acting like a judge in trying to take a position that ensures justice to the disputing sides. I also enjoyed the additional knowledge I got from the advocates of both sides. I have also enjoyed learning about the topic because I have an interest in children rights. As I already said, I have an interest in children rights. We have never discussed his topic in another course. However, the topic concerns me as a scholar and as an advocate of children’s rights. No, you are, however, welcome to request any suggestions for improvements. THE ESSAY Terminating Parental Rights T erminating parental rights is a legal action that involves taking away parental right that a person has towards a child or children. In some cases, only one parent may have his or her rights terminated if there is sufficient ground for such an end. Sometimes, the real parents of the child are denied this right, and the child is put under the care of a foster parents. A person whose parental rights have been terminated has no responsibility over a child. Moreover, they do not owe disciplinary actions to that child, or any other form of child support. The termination of parental rights renders the parents or the parent affected to be strangers to the child, and they are not allowed to contact such a child (Dane County Juvenile Court 3). A parent is the best person who can look out for their children naturally and without complains. In fact, courts are extremely reluctant to terminate parental right until they have enough bases to do that because of this natural right. However, it is i nevitable to terminate the rights of a parent to his or her child if it has been proved that he or she is overly abusive to the child. In some cases, a child is better off under the care of different people such as relatives or foster parents (Barone, Weitz and Witt 396). Regardless of the justifications in favour of such an action, this experience can be psychologically damaging to both parties. This is because children and parents have a biological bond that cannot be replaced by placing children under the care of different people. Terminating of parental rights is an activity that has recently escalated in the United States. The act is justified because it has been considered to help vulnerable children hope for quality lives. Terminating parental rights is an activity that takes place voluntarily or involuntarily. Voluntary termination takes place when both parents agree to give up their parental right. This is, for instance, for the sake of adoption. If parents cannot meet the needs of a child and they want the child to be adopted, it is required that they terminate their parental rights in order to give the foster parents full rights and responsibilities over the child (Genty 5). Involuntary termination, however, happens when a parent has subjected the child to some unacceptable conditions such as sexual abuse and child labor (Schmidt 19). It is, however, challenging to separate a child from their parents. Terminating par